Debian Security Advisory

DSA-638-1 gopher -- several vulnerabilities

Date Reported:
13 Jan 2005
Affected Packages:
gopher
Vulnerable:
Yes
Security database references:
In Mitre's CVE dictionary: CVE-2004-0560, CVE-2004-0561.
More information:

"jaguar" has discovered two security relevant problems in gopherd, the Gopher server in Debian which is part of the gopher package. The Common Vulnerabilities and Exposures project identifies the following vulnerabilities:

  • CAN-2004-0560

    An integer overflow can happen when posting content of a specially calculated size.

  • CAN-2004-0561

    A format string vulnerability has been found in the log routine.

For the stable distribution (woody) these problems have been fixed in version 3.0.3woody2.

The unstable distribution (sid) does not contain a gopherd package. It has been replaced by Pygopherd.

We recommend that you upgrade your gopherd package.

Fixed in:

Debian GNU/Linux 3.0 (woody)

Source:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.dsc
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_alpha.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_alpha.deb
ARM:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_arm.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_arm.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_i386.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_ia64.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_ia64.deb
HPPA:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_hppa.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_hppa.deb
Motorola 680x0:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_m68k.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_m68k.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mips.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_mipsel.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_powerpc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_s390.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.3woody2_sparc.deb
http://security.debian.org/pool/updates/main/g/gopher/gopherd_3.0.3woody2_sparc.deb

MD5 checksums of the listed files are available in the original advisory.